Debian Security Advisory
DLA-2391-1 ruby2.3 -- LTS security update
- Date Reported:
- 01 Oct 2020
- Affected Packages:
- ruby2.3
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-25613.
- More information:
-
A potential HTTP request smuggling vulnerability in WEBrick was reported.
WEBrick (bundled along with ruby2.3) was too tolerant against an invalid Transfer-Encoding header. This may lead to inconsistent interpretation between WEBrick and some HTTP proxy servers, which may allow the attacker to “smuggle” a request.
For Debian 9 stretch, this problem has been fixed in version 2.3.3-1+deb9u9.
We recommend that you upgrade your ruby2.3 packages.
For the detailed security status of ruby2.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby2.3
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS